14
Live Demo: Insider Threats

Insider Threats: How to Spot Trouble Quickly with AlienVault USM

Embed Size (px)

Citation preview

Page 1: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

Live Demo: Insider Threats

Page 2: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

About AlienVault

AlienVault has unified the security products, intelligence and community essential for mid-sized businesses to defend against

today’s modern threats

Page 3: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

Introductions

Garrett GrossSr. Technical Product Marketing Mgr

Mark AllenTechnical Sales Engineer

Page 4: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

Agenda

• Insider Threats & Risk Factors

• Data exfiltration methods

• Tips to mitigate these threats

• Demo: using USM to detect insider threats

Page 5: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

Insider Threat Types

• Naive insiders may be “tricked” by external

parties into providing data or passwords

they shouldn’t

• Careless insiders may make inappropriate

use of company network resources

• Malicious insiders are the least frequent,

but have the potential to cause significant

damage.

85%of insider privilege misuse

attacks used the corporate LAN…

Source: Verizon Data Breach Report, 2014

Page 6: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

Insider Risk Factors

• Ineffective management of privileged users

• Inappropriate role and entitlement assignment

• Users unaware of vulnerabilities

• Poor information classification and policy enforcement

• Inadequate auditing and analytics

• Audit log complexity

• Reactive response

• No comprehensive written acceptable use policies

• General misuse of corporate network

Page 7: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

Exfiltration

• Simple encrypted transmission

• HTTP/HTTP

• Posting to WordPress or other sites

• FTP/SFTP/SCP

• Slow & low

• Hide & Seek

• Images

• Video

• Audio (via VOIP)

• New Methods created every day

Page 8: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

Dealing with possible insider threats

• Identity Management

• Not just black/white – user/admin access

• Data Controls

• Auditing

• Restrict access to those on a “need-to-know” basis

• Advanced Authentication

• Network groups

• Policies

Page 9: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

Firewalls/Antivirus are not enough

• Firewalls are usually not the target – too difficult to effectively penetrate

• Endpoints are the target, usually via email, url redirects, misc malicious

files, etc.

• With 160,000 new malware

samples seen every day,

antivirus apps will not find

every threat

• Needs to be bolstered by

regular and comprehensive

monitoring

Page 10: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

Prevent Detect & Respond

The basics are in place for most

companies…but this alone is a ‘proven’ failed

strategy.

New capabilities to develop

Get (Very) good at detection & response

Page 11: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

@AlienVault

Asset Discovery• Active Network Scanning

• Passive Network Scanning

• Asset Inventory

• Host-based Software

Inventory

Vulnerability Assessment• Network Vulnerability Testing

• Remediation Verification

Threat Detection• Network IDS

• Host IDS

• Wireless IDS

• File Integrity Monitoring

Behavioral Monitoring• Log Collection

• Netflow Analysis

• Service Availability Monitoring

Security Intelligence• SIEM Event Correlation

• Incident Response

Page 12: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

AlienVault Labs Threat Intelligence

• Weekly updates to correlation directives to detect emerging threats

• Recent updates to Data exfiltration-related threat intelligence:

• AV Malware, Ajax Security Team Data Exfiltration

• AV Malware, Operation Machete FTP exfiltration

• AV attack, malware sending exfiltrating command output

• AV Policy violation, BitTorrent P2P usage

• AV Misc, suspicious successful login from Tor anonymity

network

• AV Policy violation, Tor anonymity network usage

• *malware – 1,161 (03/2015)

Page 13: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

Scenarios

• Vulnerable/Naive user

• Malware infection on end-user machine

• Vulnerable systems due to missed software updates

• Misuse

• BitTorrent

• Tor

• Malicious intent

• Users accessing info they shouldn’t be

• Data exfiltration

Page 14: Insider Threats: How to Spot Trouble Quickly with AlienVault USM

Now for some Q&A…

Test Drive AlienVault USM

Download a Free 30-Day Trial

http://www.alienvault.com/free-trial

Try our Interactive Demo Site

http://www.alienvault.com/live-demo-site

Questions? [email protected]